News & Analysis as of

Cybersecurity Personally Identifiable Information

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

New Mexico’s Data Breach Notification Is in Effect: What You Need to Know

by Perkins Coie on

New Mexico became the 48th state to enact data breach notification legislation with the Data Breach Notification Act, signed in April and effective as of June 16, 2017. Following a round of revisions that removed some of its...more

The Top Eight Things You Should Be Doing to Protect Your Business from Cyber Threats

by Burr & Forman on

Cyber threats take many forms. The wide-spread WannaCry ransomware attack in May of 2017 highlighted how computer files could be held hostage in return for payment, while the Dyn denial of service in October of 2016...more

FTC Chronicle: “Lessons Learned” from the Agency’s Data Breach Investigations

The Federal Trade Commission (FTC) – often criticized for not providing clear guidance as to what the agency considers reasonable data security – announced on Friday that it would publish a weekly blog discussing “lessons...more

Ashley Madison Settles Data Breach Case for $11.2M

Ashley Madison, which suffered a data breach in 2015 involving the loss of 37 million users’ personal and financial information, has settled the suit for $11.2 million....more

Cyber Law Tracker: New Connecticut Cybersecurity Strategy

by Pullman & Comley, LLC on

As its next step in the creation and implementation of a cybersecurity plan, the State of Connecticut has created a Cybersecurity Strategy document. This strategy specifically highlights the roles and vulnerabilities of state...more

Three big questions about AI in financial services

by White & Case LLP on

To ride the rising wave of AI, financial services companies will have to navigate evolving standards, regulations and risk dynamics—particularly regarding data rights, algorithmic accountability and cybersecurity....more

Cyber Threats Equal Serious Threats

by Burr & Forman on

Every where you look these days, there seems to be another report of a cyber attack--attacks which do not discriminate based on industry type, size of business, or impact. In other words, everyone is vulnerable. In fact, the...more

NYDFS Updates FAQs to Clarify Cybersecurity Regulations

by Ballard Spahr LLP on

The New York Department of Financial Services (NYDFS) recently updated frequently asked questions (FAQs) about its cybersecurity regulations, 23 NYCRR 500, to address four new issues. NYDFS published its initial set of FAQs...more

DOJ Asks SCOTUS to Take on Microsoft Case and Verizon Suffers its own Data Breach: eDiscovery Trends

by CloudNine on

A rare two-topic day, but both are notable… Remember the Microsoft Ireland Warrant case, where the Second Circuit reversed earlier rulings and denied the government’s efforts to compel Microsoft to provide emails in that...more

Ransomware is taking the world by storm; does insurance respond?

On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more

DFS Cyber Compliance Nightmare? Detailed survey results indicate compliance is far from reach

New York’s powerful Department of Financial Services (DFS) upended cybersecurity regulation with its new and sweeping “Cybersecurity Requirements for Financial Services Companies,” which took effect on March 1, 2017. But is...more

Class Action and Regulatory Settlements Reflect the Rising Cost of Data Breaches

by Carlton Fields on

As the number of data breaches continues to increase, so too do the costs. After a breach occurs, companies typically expend significant sums conducting investigations, notifying customers and regulators, and engaging in...more

Office of the National Coordinator Issues Guidance After NotPetya Attack

Following the most recent ransomware attack, known as NotPetya, (among other nicknames), many health care entities were victims of the ransomware, which prompted the Office of the National Coordinator (ONC) to issue guidance...more

Alabama Man Sentenced to Prison for Elaborate “Phishing” Scheme

by Balch & Bingham LLP on

An Alabama man has been sentenced to spend six months in prison for illegally accessing the personal information of over fifty women. For over two years, Kevin Maldonado engaged in a hacking technique called “phishing,”...more

Unintended Plaintiffs: United States District Court Allows Private Citizens to Sue a Government Contractor For Failing to...

In a remarkable opinion with potentially wide-ranging implications, the United States District Court for the District of Columbia recently allowed a member of the public to sue a federal government contractor directly for...more

Amendment To Japan’s Omnibus Data Protection Law Mean New Compliance Requirements For U.S. Multinational Employers With Operations...

by Littler on

Effective May 30, 2017, Japan amended its omnibus data protection law, the Personal Information Protection Act (“PIPA”), to add new compliance requirements that will have an immediate impact on many U.S. multinational...more

Southern Oregon University Victim of Phishing Scheme

Last month, Southern Oregon University (SOU) announced that it was the victim of a $1.9 million phishing scheme. SOU received an email purportedly from their contractor, Anderson Construction, requesting the April payment for...more

Top 10 Employment & Labour Issues for Employers

1: Accommodation in the Workplace - OVERVIEW - Employers have a duty to accommodate employees’ needs based on those grounds protected under federal and provincial human rights legislation. All employers are required...more

When Health Data Goes Missing: Largest Reported Ransomware Attack

In the aftermath of two powerful global ransomware attacks, a Michigan-based medical equipment provider has disclosed that hackers “encrypted our data files” and accessed more than 500,000 patient records in what is believed...more

Health Care Data Breaches Cost $380 per Record

A new study issued by Ponemon Institute, sponsored by IBM, reveals that healthcare data breaches still cost more than in other sectors. The Ponemon Institute’s calculation is that the average healthcare data breach costs...more

OCR Issues Reminder on Security Incidents

Following the frequent and varied ransomware attacks on health care entities over the past few years, the Office for Civil Rights (OCR) published guidance last summer to the health care industry reminding it that a ransomware...more

HHS Releases Health Care Industry Cybersecurity Task Force Report

Last week, the Department of Health and Human Services (HHS) issued its “Report on Improving Cybersecurity in the Health Care Industry,” which is the culmination of a year-long effort on behalf of the Cybersecurity Task...more

Phishing Lures: What To Do If You’ve Taken The Bait - U.S. Version

by Dickinson Wright on

Sometimes, it’s easy to know you’re being phished. There’s little chance that a bank administrator in a country you’ve never heard of really needs your help to get the unclaimed money of a deceased, rich foreigner out of the...more

New Jersey Senate Passes Bill Limiting Identity-Card Scanning by Retailers for Limited Purposes

by Sedgwick LLP on

On June 22, 2017, the New Jersey Senate passed the Personal Information and Privacy Protection Act (“the Act”), now awaiting Governor Christie’s handling. The Act permits retailers to scan a person’s identity card (“I.D....more

Privacy & Cybersecurity Update - June 2017

In this month's edition of our Privacy & Cybersecurity Update, we examine a new Chinese cybersecurity law that went into effect despite international concern for how it will be implemented; Colorado's adoption of new...more

572 Results
|
View per page
Page: of 23
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.